We provide IT Staff Augmentation Services!

Application Security Engineer Intern Resume

5.00/5 (Submit Your Rating)

Ny, NY

TECHNICAL SKILLS:

Programming Skills: Python, JavaScript, Bash, C

Security Tools: Nmap, Nessus, Metasploit, Ettercap, SSLstrip, Netcat, John the Ripper, Aircrack - ng, Wireshark

Operating system security: UNIX/ Linux(Red Hat, Debian), Windows (XP, 7, Server 2012 R2)

Web security: OWASP top 10

Network security: TCP/IP, IDS/IPS administration, Firewall configuration, Setting up routers and ACL, HTTP/HTTPS, FTP, SSH, SMB, SMTP, SELinux and firewalld filtering techniques

EXPERIENCE:

Confidential, NY, NY

Application Security Engineer Intern

Responsibilities:

  • Applied manual hacks and tools such as Burp Proxy to perform black box and white box vulnerability assessments of web applications
  • Assessed information security risks associated with networking systems
  • Produced written reports detailing findings, risk levels and mitigation recommendations

Confidential

Application Security Engineer Intern

Responsibilities:

  • Encrypt files before storing on a cloud storage server so that the server cannot read the file content but a desired peer can
  • Using Crypto++ library we implement AES encryption to ensure confidentiality of data and HMAC to ensure integrity of data. We use RSA scheme to securely transmit private keys to the desired peer.
  • Create awareness and illustrate the dangers of storing unencrypted files on the cloud. Provide users with a simple to use one click tool to encrypt/decrypt files and securely send files to their peers

Confidential

Application Security Engineer Intern

Responsibilities:

  • Detect possible DDOS attack and check for presence of malicious IP addresses in PCAP file
  • Scan all IP addresses in PCAP against a blacklist file to determine if any of them are malicious
  • If a malicious IP address sending traffic over a certain threshold is detected, DDOS attack alert is sent to the user

Confidential

Application Security Engineer Intern

Responsibilities:

  • Successfully gained administrative access to Windows XP SP2 (unpatched) using MS08 067 netapi exploit.
  • Detected and eradicated HackerDefender kernel rootkit using anti-virus forensics tool chrootkit.
  • Utilized Aircrack-ng suite for wireless traffic capture, analysis and password recovery
  • Exploited common web vulnerabilities such as JavaScript injection, SQL injection, XSS, CSRF, broken authentication and session management, clickjacking etc.
  • Security tools: OWASP ZAP, Burp Proxy, OpenVAS, Wikto, SQLMap, BeEF

We'd love your feedback!